Hashing MCQ Questions And Answers
This section focuses on "Hashing" in Blockchain. These Multiple Choice Questions (MCQ) should be practiced to improve the Blockchain skills required for various interviews (campus interviews, walk-in interviews, company interviews), placements, entrance exams and other competitive examinations.
1. A hash function takes an input string with?
A. numbers
B. alphabets
C. media files
D. All of the above
View Answer
Ans : D
Explanation: A hash function takes an input string (numbers, alphabets, media files) of any length and transforms it into a fixed length.
2. The fixed-length output is called a ?
A. hash
B. bitcoin
C. data
D. value
View Answer
Ans : A
Explanation: The fixed-length output is called a hash.
3. A Bitcoin blockchain uses?
A. RSA
B. SHA-128
C. SHA-256
D. All of the above
View Answer
Ans : C
Explanation: A Bitcoin blockchain uses SHA-256 (Secure Hash Algorithm) hashing algorithm
4. In 2001, SHA-256 Hashing algorithm was developed by the ?
A. DFA
B. CSA
C. ZSA
D. NSA
View Answer
Ans : D
Explanation: In 2001, SHA-256 Hashing algorithm was developed by the National Security Agency (NSA) in the USA.
5. Message authentication code is also known as
A. key code
B. hash code
C. keyed hash function
D. message key hash function
View Answer
Ans : C
Explanation: Message authentication code is also known as keyed hash function.
6. What is a one-way password file?
A. A scheme in which the password is jumbled and stored
B. A scheme in which the hash of the password is stored
C. A scheme in which the password is XOR with a key and stored
D. A scheme in which the password is passed through a PRF, which is then stored
View Answer
Ans : B
Explanation: A scheme in which the hash of the password is stored by an operating system rather than the password itself is the one-way password file system.
7. A larger hash code cannot be decomposed into independent subcodes.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : B
Explanation: Hash codes can be decomposed into independent subcodes and this was the logic behind the meet in the middle attack.
8. If the compression function is collision resistant, then so is the resultant iterated hash function.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A
Explanation: The problem of designing a secure hash function reduces to that of designing a collision resistant compression function.
9. Which one of the following is not an application hash functions?
A. One-way password file
B. Virus Detection
C. Intrusion detection
D. Key wrapping
View Answer
Ans : D
Explanation: Key wrapping is a separate algorithm and not an application of hash fuctions.
10. When a hash function is used to provide message authentication, the hash function value is referred to as
A. Message Field
B. Message Score
C. Message Digest
D. Message Leap
View Answer
Ans : C
Explanation: A hash function providing message authentication is referred to as massage digest.
Discussion